Six Steps to Protect Customer Data

The Facebook - Cambridge Analytica scandal is simply the natural outcome of today's data-driven economy that puts businesses and others first, not users. Mark Zuckerberg's apology is a first step, but it's not enough. 

The seriousness of the revelations calls for more than mere apologies.

Change is Needed

Society needs higher standards for transparency and ethics when it comes to the handling of our information. Anyone who collects data must be accountable to their users and to society.

As we have seen recently, data abuse and mishandling can have grave consequences for both individuals and society.

The Internet Society is deeply committed to an Internet that is trusted by its users. In a connected world, everyone is affected by everybody else's actions. Incidents like this contribute to an overall climate of declining trust in the Internet and threaten its economic value.

We recommend that those who collect, use or share our data:

  1. Make sure policies about data handling reflect our interests first. As their users, we should be their first priority
  2. They must restrict and monitor any access or use of our personal data. Don't collect our data if you can't manage it.
  3. Be transparent about how they share our personal data, with whom and why.
  4. Set clear rules for handling and sharing our personal data and show us how those rules are being enforced.
  5. If our data is going to be collected, make it easy for us to control what will be collected, how it will be used, and who it will be shared with.
  6. Ask us to opt-in. Don't require us to opt-out.

If we are to continue to benefit from the value the Internet can bring, we must trust our services and platforms. Businesses must do better.

Information- Management

You Might Also Read: 

Is Your Data Being Sold On The Dark Web?:

Data Protection Officer's Guide To The GDPR Galaxy:

 

« GDPR Countdown
Fixing Hacks Has A Deadly Impact On Hospitals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.